1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesantik [10]
4 years ago
14

The IT department in a company is looking for a solution to consolidate the functionality of several mission critical server com

puters into VMs on a few high performance host machines. Which two hypervisors should be considered
Computers and Technology
1 answer:
marshall27 [118]4 years ago
8 0

Answer: (1) Oracle VM Server  

               (2) VM Ware v Sphere

Explanation:

  The oracle VM server and the VM ware v Sphere are the two hyper-visors that is used in the IT department by an organization for the purpose of high performance.

  • The oracle VM (Virtual machine) server is one of the type of virtual machine that is used to run various types of operating system and oracle VM server is one of the open source technology that support Linux and window.
  • The VM ware V sphere is one of the type of visualization based application which basically run the multiple OS based system by using the single machine. It is also helps in balancing the workload in the system.  

According to the given question, the two given hyper-visors are used by the information technology department that helps in handling the critical functionality in an organization.

 Therefore, The given answer s correct.

You might be interested in
To type a small letter "z", you would use the right little finger. (5 points)True False
Klio2033 [76]
False you would choose the little finger...you would use the third finger.
4 0
4 years ago
A column to be used in a database is called the
Temka [501]

it is called an attribute

8 0
3 years ago
_________values are stored as the number of seconds since the unix epoch (35 POINTS)
Nataly_w [17]

Answer:

he Unix epoch (or Unix time or POSIX time or Unix timestamp) is the number of seconds that have elapsed since January 1, 1970 (midnight UTC/GMT), not counting leap seconds (in ISO 8601: 1970-01-01T00:00:00Z).

Explanation:

The answer above is from a secure website

3 0
3 years ago
If Mary makes homemade jams that she sells to her local grocer, she is practicing:
DIA [1.3K]

Answer: c) C2B (Consumer to business)

Explanation: Consumer to business (C2B) is the business technique in which the consumer or customer generates the good or service and then businesses are offered to take that product or service. The case mentioned in the question is also similar where May sells the jams made by her to the local grocer who has his business.

Other options are incorrect because Business to business (B2B) is where two business party trade with each other, Business to consumer (B2C) is business offer the product or service to consumer and Costumer to costumer(C2C) is the private trading of service between two individual parties. Thus,the correct option is option(c).

8 0
3 years ago
What would be the result of sending the string AAAAAAAAAAAAAAAAAAAA into a variable that has allocated space for 8 bytes
DerKrebs [107]

The result of sending the string above into a variable that has allocated space for 8 bytes is that there will be Buffer Overflow Attacks.

<h3>What occurs when a string of data  sent to buffer is large?</h3>

A buffer overflow is also known as buffer overrun. This  is known to be a process that occurs when or if  the size of data is known to be more than the storage capacity of any kind of memory buffer.

Note that due to the overload, the program that is trying to write the data to the buffer will therefore overwrites to the adjacent memory locations.

Learn more about string from

brainly.com/question/26427527

4 0
3 years ago
Other questions:
  • Which connector is most commonly used to connect printers to desktop pc systems?
    10·1 answer
  • Write an application program that creates and prints a random phone number of the form XXX-XXX-XXXX. Include the dashes in the o
    5·1 answer
  • What cell phone technology is the most popular in the united states?
    8·2 answers
  • I'm using assembly language. This is my assignment. I kinda confused about how to write code for this assignment. Can anyone exp
    11·1 answer
  • Raj’s computer just crashed and he lost most of his files. What should he do to avoid this problem in the future?
    10·2 answers
  • I need help building a computer what are some good parts?
    9·1 answer
  • what does it mean if you get the brainlyest ?and why does everyone want it so bad? and how do i give it to someone?
    6·1 answer
  • 1 paint 2 anahaw leaf 3 shellac 4 varnish 5 metal sheets 6 paint 7 G.I. pipe 8 enamel paint 9 bamboo 10 fillers
    14·1 answer
  • What is an a free open source content management system for publishing web content​
    8·1 answer
  • Who tryna trade in gta my psn is xMadOrNawx-_-
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!